Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe
-
Size
524KB
-
MD5
4ccfc18c2eebb7b3ba9cd7b53e540d3b
-
SHA1
ae6b1d06bb5d91c8a390218ff6b5eb6a23c8b61d
-
SHA256
c22bddc105d939931a107ec48ff42203b6fda9b42bfb9665a2c09142f2e124d8
-
SHA512
90f3623b6f42d9ca1d8d4159d08cb7e7a5fae9c0e6301c8fa5975dc86521e2cdf2db9457ce6bddfd8bf97df3c66b72835bde558890232ea94b4e043fd431de87
-
SSDEEP
12288:81sPLy/3dkSLshG+u5SoQNSPcQ+Dcy3SS:OKdukoQNmMS
Malware Config
Extracted
netwire
gracebillionaire.freemyip.com:39360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
cMDqgRYn
-
offline_keylogger
true
-
password
Sucess1000$
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2524-78-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2524-79-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2524-80-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 2524 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2524 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 28 PID 2808 wrote to memory of 2524 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 28 PID 2808 wrote to memory of 2524 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 28 PID 2808 wrote to memory of 2524 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 28 PID 2808 wrote to memory of 2524 2808 4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ccfc18c2eebb7b3ba9cd7b53e540d3b_JaffaCakes118.exe"2⤵PID:2524
-